1 / 33

iPhone Privacy

iPhone Privacy. Nicolas Seriot∗ Black Hat DC 2010 Arlington, Virginia, USA Presented by Sanjay Kumar Kunta. Outline . Introduction Motivation

xenos
Download Presentation

iPhone Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. iPhone Privacy Nicolas Seriot∗ Black Hat DC 2010 Arlington, Virginia, USA Presented by Sanjay Kumar Kunta

  2. Outline • Introduction • Motivation • History of privacy iPhone concerns • Writing spyware for iPhone • Attack scenarios • Recommendations • Conclusion

  3. Introduction When an application is downloaded from AppStore to an iPhone, there are chances of accessing the user’s personal data. I would like to discuss about : • Data that are at risk • How they are been accessed without user's knowledge. • Certain attack scenarios and user recommendations.

  4. Motivation Press reports: • Customers of ID Mobile’s MogoRoad iPhone application are complaining that they’re getting sales calls from the company, a process which turns out to be technically a piece of cake. (The Register, 30th September 2009) • A maker of some of the most popular games for the iPhone has been surreptitiously collecting users’ cell numbers without their permission, according to a federal lawsuit filed Wednesday. (The Register, 6th November 2009)

  5. Motivation • iPhone owners in Australia awoke this weekend to find their devices targeted by self-replicating attacks that display an image of 1980s heart throb Rick Astley that’s not easily removed. (The Register, 8th November 2009) • Can users trust iPhone applications because they are reviewed by Apple? • The aim of this talk is to get facts and a clear view of iPhone privacy issues, in order to help consumers

  6. History of iPhone privacy concerns

  7. History of iPhone privacy concerns • Root Exploits libtiff: • The first exploit was due to multiple buffer overflows discovered in libtiff by Tavis Ormandy. • The vulnerable libtiff version was used by the Apple’s ImageIO framework. • The simple opening of a maliciously crafted TIFF image could lead to arbitrary code execution.

  8. History of iPhone privacy concerns SMS fuzzing: • The researchers presented an iPhone vulnerability that could allow a hacker to seize control of the phone through maliciously crafted SMS messages. • The vulnerability was patched in iPhone.

  9. History of iPhone privacy concerns 2. Personal data harvesting: Aurora Feint: • The popular iPhone game Aurora Feint was the first application to be pulled from the App Store due to privacy concerns. • The game would upload all the contacts stored in the iPhone to the developer’s server, allegedly to discover if any of the user’s friends also play that game.

  10. History of iPhone privacy concerns MogoRoad: • The Swiss road traffic information application MogoRoad was pulled from App Store after users complained they got sales calls from the company. • MogoRoad is back on App Store after Mogo’s explanations.

  11. History of iPhone privacy concerns Storm8 complaint: • A federal lawsuit was filed in California against iPhone applications editor Storm8, whose games had already been downloaded more than 20 million times. • The games were harvesting the user’s phone number without encryption. Since then, Storm8 games have stopped collecting the users’ phone numbers.

  12. History of iPhone privacy concerns Pinch Media: Pinch Media is a free analytics framework used by many iPhone developers. Pinch Media used to collect: • unique hardware identifier, • model of your phone, • application’s name, • length of time application was run, • the user’s location, gender and age of user if connected to facebook.

  13. History of iPhone privacy concerns 3. Worms on jailbroken devices Ikee: • Ikee is the first known iPhone worm. • It changes the iPhone’s wallpaper and displays a photograph of 1980s singer Rick Astley with the words “Ikee is never gonna give you up”. • It was written by a 21-year old australianprogrammer, who was subsequently hired by the Australian iPhone development company mogeneration.

  14. History of iPhone privacy concerns Dutch 5 euro ransom: • This worm locked the screen with the following message: Your iPhone’s been hacked because it’s really insecure! Please visit doiop.com/iHacked and secure your iPhone rightnow! Until the user had paid a 5 e ransom on a PayPal account.

  15. Writing spyware for the iPhone Methodology: • Imagine that we would like to write a spyware for the iPhone. • It would look like a breakout game and actually play breakout but, at the same time, silently harvest personal data and send them to a remote server. • In order to reach the App Store, the spyware can’t normally use private APIs, because this is forbidden by Apple and checked during the mandatory review process.

  16. Writing spyware for the iPhone Entry points 1. Cell Number: • The first and easiest item of personal data to collect is the user’s phone number. This number is entered in iTunes when the phone is first connected. • The number is stored in the file “.GlobalPrefrences.plist.” Listing shows hot to retrieve the number programmatically.

  17. Writing spyware for the iPhone • Address Book: Another way to collect personal data is through the Address Book API. • It turns out that the full Address Book is readable without the user’s knowledge or consent. • It contains names, users’ phone numbers and email addresses, but also a “notes field”, in which many Mac users store sensitive data such as door codes or bank accounts. • These notes are synchronized with the user’s computer and may be harvested on the iPhone. Moreover, a spyware can edit the Address Book, that is add, change or delete any record, without the user’s knowledge or consent.

  18. Writing spyware for the iPhone 3. File System: • we consider the data that can be read on the iPhone file system. • A sandboxing mechanism limits access to other application’s data. Third party applications are installed in /private/var/mobile/Applications/ and are prevented from seeing each other or accessing specific locations, such as the Music Library for instance. • The sandboxing mechanism is implemented at the kernel level and described by a set of rules shown in the file SandboxTemplate.sb

  19. It turns out that, despite sandboxing, numerous system and application preference files are in fact readable (see listing 2) by downloaded applications, and some of them contain personal data. • This concerns primarily preference files in plist format, but is not limited to them. • The file system can be browsed and the content of these files viewed using the open-source file system browser FSWalker21

  20. Introducing SpyPhone • SpyPhone is an open-source proof which can gather the potentially valuable information from all the sourceslike phone number, the Address Book contents and several other pieces of data readable on the file system.

  21. Attack Scenarios • Here are some attack scenarios, outlining the potential consequences of a “privacy attack” and illustrating ways in which iPhone security is not as good as it should be • Spammer: • A breakout game is made available for free on Apple’s App Store. While you are playing breakout, it reads your email address, your recent Safari searches, your weather cities and the words contained in your keyboard cache. • When you submit your high score to the application’s server, stolen information is sent at the same time in an encrypted form. The application also sends all the email addresses in your address book.

  22. The blackmailer: • A collaborative application on Hollywood gossip is made available for free on the App Store. While giving clues about spotting stars, it surreptitiously goes through your address book and edits the email addresses. • Knowing that film industry people are likely to download this application, the emails they send are diverted to a clandestine server, providing potentially compromising private information to a prospective blackmailer. • The approach can be tailored to produce the same scenario in the industrial, political or financial world.

  23. 3. The luxury products thief: • An application for Rolls Royce owners or art collectors could report the name, the area, the phone and the geotagged photos of wealthy people. • Thisis enough information to rob them, especially if it can be determined that the targeted individuals are currently away from home.

  24. The jealous husband: • Unlike the previous scenarios, this one needs a physical access to the device. • A detective, an evil competitor or even a jealous husband may be interested in stealing the personal data in an iPhone to which they have physical access. All that is needed to do so is a Mac, a 99 USD Apple developer license and a USB cable. • It takes just five minutes to install SpyPhone, steal the personal data with the “email report” function, erase the evidence by deleting the sent mail and delete SpyPhone itself.

  25. Recommendations For Apple Don’t rely on security through obscurity: • First of all, Apple should stop claiming that an application cannot access data from other applications. • Secondly, Apple should decide if the observed behavior, present since day one, is a flaw or not. If it is not, then Apple should document it properly. • But if it is, Apple may have to review its secure software development lifecycle (S-SDLC) process.

  26. Wifi connection log and keyboard cache: • There is no reason why the wifi connection logs should be readable. • The same applies to the keyboard cache, which should be an OS service associated with text fields. It should not be possible to retrieve their whole contents. Address Book: • Users should be required to grant access to the Address Book • Individually for each application, as is currently the case for the Core Location framework. A breakout game has no business accessing your contacts.

  27. Towards Apple approved security policies? • To stay in line with the current model where most of the iPhone security depends on Apple and not the user, Apple could ask application developers to establish a security policy for their applications. • This approach is actually a very simple version of a self-defined sandboxing principle called model-carrying.

  28. Conclusion • Unix permissions, sandboxing system rule sets and App Store reviews are all very well in theory but their actual implementation is flawed. • Numerous files are still readable directly by an application downloaded from App Store, mainly preference files, but also the photo library including geotags, the keyboard cache and the Wifi joined networks history. • It is a matter of concern that, two years and a half after iPhone’s introduction, and despite its huge commercial success, Apple has not fully addressed several basic file system privacy issues and, even worse, continues to disseminate misleading information in its public documentation on iPhone security.

  29. References • http://pdf.thepdfportal.com/PDFFiles/30954.pdf • Apple, iPhone in Business: Security Overview, http://images.apple.com/iphone/business/docs/iPhone_Security_Overview.pdf • Jonathan Zdziarski, iPhone Forensics: Recovering Evidence, Personal Data and Corporate Assets, O’Reilly Media, September 2008, http: //oreilly.com/catalog/9780596153595 • Sharon D. Nelson and John W. Simek, Why Lawyers Shouldn’t Use The iPhone: A Security Nightmare, Sensei Enterprises, Inc http://www.senseient.com/articles/pdf/iphone_security.pdf

  30. Thank-you

More Related